Which of the Following Is an Example of Two-factor Authentication

Which of the Following Is an Example of Two-factor Authentication